MA in IT Cyber Security

Apply

Area of Studies

mathematics, informatics

Degree

Master

Degree (in English)

Master

Language(s)
  • English
Course Duration

2 years/4 semesters

www

umcs.pl

Department

Maria Curie-Sklodowska University in Lublin

Tuition and Other Fees

https://rekrutacja.umcs.pl/en/fees/

Application Deadline(s)

April - September

Course Description

Course Profile

IT Cyber Security is a program for those who wish to combine knowledge of computer science with knowledge of political science and administration.

The knowledge related to political science and administration includes:

1. the place of cybersecurity in the contemporary understanding of security;

2. the complexity of security threats in cyberspace;

3. diversity of areas of activities to ensure security in cyberspace, taking into account political science, but also legal, economic and sociological approaches.

Knowledge related to computer science includes:

1. The principles of operation of the operating system, its tasks and weaknesses;

2. basic programming structures and rules of designing programming scripts;

3. functioning of web applications and knowledge about the basic weaknesses of web applications;

4. principles of operation of computer networks and, weaknesses of protocols and mechanisms operating in all layers of the OSI model;

5. principles and best practices for safe web application programming;

6. principles of operation of cryptographic modules and the manner of their application in IT Systems;

7. the process of performing penetration tests and ability to describe each stage;

8. standards for information security management.

Computer science skills include:

1. efficient performance of tasks in the Linux operating system; 2) designing a simple algorithm and creating its implementation using Python;

2. conducting security tests for Web applications based on the OWASP standard;

3. analyzing the weaknesses of the computer network and applying a security mechanism to protect against potential attacks;

4. finding security bugs in web applications and applying corrections to eliminate them;

5. performance of the required analysis regarding the application of cryptographic methods and the use of appropriate cryptographic modules;

6. performing all stages of penetration testing;

7. creating process documentation of the IT system and conducting a risk analysis of such a system.

Education Requirements

Please check it here.

Contact

studyinenglish@umcs.pl

 +48 519 464 828 (also WhatsApp)

Apply